<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 17:04:43 +0000</lastBuildDate>
    <item>
      <title>e584e485-98ad-481d-9012-fbfeaaaf9dc3</title>
      <link>https://vulnerability.circl.lu/sighting/e584e485-98ad-481d-9012-fbfeaaaf9dc3/export</link>
      <description>{"uuid": "e584e485-98ad-481d-9012-fbfeaaaf9dc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15462", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-35939\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at `/var/lib/php/sessions`. Such session files are named `sess_[session_value]`, where `[session_value]` is provided to the client in a `Set-Cookie` response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue.\n\ud83d\udccf Published: 2025-05-07T22:41:29.728Z\n\ud83d\udccf Modified: 2025-05-07T22:41:29.728Z\n\ud83d\udd17 References:\n1. https://github.com/craftcms/cms/pull/17220\n2. https://github.com/craftcms/cms/releases/tag/4.15.3\n3. https://github.com/craftcms/cms/releases/tag/5.7.5", "creation_timestamp": "2025-05-07T23:23:32.000000Z"}</description>
      <content:encoded>{"uuid": "e584e485-98ad-481d-9012-fbfeaaaf9dc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15462", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-35939\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at `/var/lib/php/sessions`. Such session files are named `sess_[session_value]`, where `[session_value]` is provided to the client in a `Set-Cookie` response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue.\n\ud83d\udccf Published: 2025-05-07T22:41:29.728Z\n\ud83d\udccf Modified: 2025-05-07T22:41:29.728Z\n\ud83d\udd17 References:\n1. https://github.com/craftcms/cms/pull/17220\n2. https://github.com/craftcms/cms/releases/tag/4.15.3\n3. https://github.com/craftcms/cms/releases/tag/5.7.5", "creation_timestamp": "2025-05-07T23:23:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e584e485-98ad-481d-9012-fbfeaaaf9dc3/export</guid>
      <pubDate>Wed, 07 May 2025 23:23:32 +0000</pubDate>
    </item>
    <item>
      <title>0f1b6250-3b82-4e1b-a36f-e61767235e61</title>
      <link>https://vulnerability.circl.lu/sighting/0f1b6250-3b82-4e1b-a36f-e61767235e61/export</link>
      <description>{"uuid": "0f1b6250-3b82-4e1b-a36f-e61767235e61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lomkcu27baz2", "content": "", "creation_timestamp": "2025-05-07T23:30:24.343531Z"}</description>
      <content:encoded>{"uuid": "0f1b6250-3b82-4e1b-a36f-e61767235e61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lomkcu27baz2", "content": "", "creation_timestamp": "2025-05-07T23:30:24.343531Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0f1b6250-3b82-4e1b-a36f-e61767235e61/export</guid>
      <pubDate>Wed, 07 May 2025 23:30:24 +0000</pubDate>
    </item>
    <item>
      <title>9af3f999-9177-48c7-95a8-c16cc4f8a792</title>
      <link>https://vulnerability.circl.lu/sighting/9af3f999-9177-48c7-95a8-c16cc4f8a792/export</link>
      <description>{"uuid": "9af3f999-9177-48c7-95a8-c16cc4f8a792", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lomnooe7my2l", "content": "", "creation_timestamp": "2025-05-08T00:27:20.485740Z"}</description>
      <content:encoded>{"uuid": "9af3f999-9177-48c7-95a8-c16cc4f8a792", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lomnooe7my2l", "content": "", "creation_timestamp": "2025-05-08T00:27:20.485740Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9af3f999-9177-48c7-95a8-c16cc4f8a792/export</guid>
      <pubDate>Thu, 08 May 2025 00:27:20 +0000</pubDate>
    </item>
    <item>
      <title>36905015-e081-4a1f-aaaa-63356775b8e5</title>
      <link>https://vulnerability.circl.lu/sighting/36905015-e081-4a1f-aaaa-63356775b8e5/export</link>
      <description>{"uuid": "36905015-e081-4a1f-aaaa-63356775b8e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "https://t.me/cvedetector/24784", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-35939 - Craft CMS Unauthenticated Session File Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-35939 \nPublished : May 7, 2025, 11:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at `/var/lib/php/sessions`. Such session files are named `sess_[session_value]`, where `[session_value]` is provided to the client in a `Set-Cookie` response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-08T03:23:24.000000Z"}</description>
      <content:encoded>{"uuid": "36905015-e081-4a1f-aaaa-63356775b8e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "https://t.me/cvedetector/24784", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-35939 - Craft CMS Unauthenticated Session File Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-35939 \nPublished : May 7, 2025, 11:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : Craft CMS stores arbitrary content provided by unauthenticated users in session files. This content could be accessed and executed, possibly using an independent vulnerability. Craft CMS redirects requests that require authentication to the login page and generates a session file on the server at `/var/lib/php/sessions`. Such session files are named `sess_[session_value]`, where `[session_value]` is provided to the client in a `Set-Cookie` response header. Craft CMS stores the return URL requested by the client without sanitizing parameters. Consequently, an unauthenticated client can introduce arbitrary values, such as PHP code, to a known local file location on the server. Craft CMS versions 5.7.5 and 4.15.3 have been released to address this issue. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-08T03:23:24.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/36905015-e081-4a1f-aaaa-63356775b8e5/export</guid>
      <pubDate>Thu, 08 May 2025 03:23:24 +0000</pubDate>
    </item>
    <item>
      <title>61c3061f-d81b-4beb-ab99-d76145efa601</title>
      <link>https://vulnerability.circl.lu/sighting/61c3061f-d81b-4beb-ab99-d76145efa601/export</link>
      <description>{"uuid": "61c3061f-d81b-4beb-ab99-d76145efa601", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/4135365", "content": "", "creation_timestamp": "2025-06-02T17:59:17.845906Z"}</description>
      <content:encoded>{"uuid": "61c3061f-d81b-4beb-ab99-d76145efa601", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/4135365", "content": "", "creation_timestamp": "2025-06-02T17:59:17.845906Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/61c3061f-d81b-4beb-ab99-d76145efa601/export</guid>
      <pubDate>Mon, 02 Jun 2025 17:59:17 +0000</pubDate>
    </item>
    <item>
      <title>344c660c-c5be-4f4f-9a37-d34f8c77a968</title>
      <link>https://vulnerability.circl.lu/sighting/344c660c-c5be-4f4f-9a37-d34f8c77a968/export</link>
      <description>{"uuid": "344c660c-c5be-4f4f-9a37-d34f8c77a968", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lqq6sx4aqa22", "content": "", "creation_timestamp": "2025-06-03T21:02:18.584665Z"}</description>
      <content:encoded>{"uuid": "344c660c-c5be-4f4f-9a37-d34f8c77a968", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lqq6sx4aqa22", "content": "", "creation_timestamp": "2025-06-03T21:02:18.584665Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/344c660c-c5be-4f4f-9a37-d34f8c77a968/export</guid>
      <pubDate>Tue, 03 Jun 2025 21:02:18 +0000</pubDate>
    </item>
    <item>
      <title>8c2d0184-3d17-4e48-9633-25bc18d1e4a3</title>
      <link>https://vulnerability.circl.lu/sighting/8c2d0184-3d17-4e48-9633-25bc18d1e4a3/export</link>
      <description>{"uuid": "8c2d0184-3d17-4e48-9633-25bc18d1e4a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-28T08:23:31.000000Z"}</description>
      <content:encoded>{"uuid": "8c2d0184-3d17-4e48-9633-25bc18d1e4a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-28T08:23:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8c2d0184-3d17-4e48-9633-25bc18d1e4a3/export</guid>
      <pubDate>Sun, 28 Sep 2025 08:23:31 +0000</pubDate>
    </item>
    <item>
      <title>7513447b-1ded-4f3f-ab6d-588840f8a6a4</title>
      <link>https://vulnerability.circl.lu/sighting/7513447b-1ded-4f3f-ab6d-588840f8a6a4/export</link>
      <description>{"uuid": "7513447b-1ded-4f3f-ab6d-588840f8a6a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-29T03:12:18.000000Z"}</description>
      <content:encoded>{"uuid": "7513447b-1ded-4f3f-ab6d-588840f8a6a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-29T03:12:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7513447b-1ded-4f3f-ab6d-588840f8a6a4/export</guid>
      <pubDate>Mon, 29 Sep 2025 03:12:18 +0000</pubDate>
    </item>
    <item>
      <title>36adff32-18b8-42df-9ae0-b6ae3d5af5aa</title>
      <link>https://vulnerability.circl.lu/sighting/36adff32-18b8-42df-9ae0-b6ae3d5af5aa/export</link>
      <description>{"uuid": "36adff32-18b8-42df-9ae0-b6ae3d5af5aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "published-proof-of-concept", "source": "https://t.me/realcodeb0ss/204", "content": "", "creation_timestamp": "2025-12-05T22:04:30.000000Z"}</description>
      <content:encoded>{"uuid": "36adff32-18b8-42df-9ae0-b6ae3d5af5aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-35939", "type": "published-proof-of-concept", "source": "https://t.me/realcodeb0ss/204", "content": "", "creation_timestamp": "2025-12-05T22:04:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/36adff32-18b8-42df-9ae0-b6ae3d5af5aa/export</guid>
      <pubDate>Fri, 05 Dec 2025 22:04:30 +0000</pubDate>
    </item>
    <item>
      <title>57204736-b049-4cd7-a4ef-288b11738db4</title>
      <link>https://vulnerability.circl.lu/sighting/57204736-b049-4cd7-a4ef-288b11738db4/export</link>
      <description>{"uuid": "57204736-b049-4cd7-a4ef-288b11738db4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-35939", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/f495a171-40e0-4d88-8eb6-38045d33001b", "content": "", "creation_timestamp": "2026-02-02T12:26:00.058821Z"}</description>
      <content:encoded>{"uuid": "57204736-b049-4cd7-a4ef-288b11738db4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-35939", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/f495a171-40e0-4d88-8eb6-38045d33001b", "content": "", "creation_timestamp": "2026-02-02T12:26:00.058821Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/57204736-b049-4cd7-a4ef-288b11738db4/export</guid>
      <pubDate>Mon, 02 Feb 2026 12:26:00 +0000</pubDate>
    </item>
  </channel>
</rss>
